Types of Attacks Summary - CSU1288 - Shoolini U

Summary of Types of Attacks

1. Overview of Cyber Attacks

2. Scanning Attacks

  1. Port Scanning: Identifying open ports using tools like Nmap, Netcat.
  2. Vulnerability Scanning: Searching for security weaknesses using Nessus, OpenVAS.
  3. Network Mapping: Mapping active devices in a network using Traceroute, Netdiscover.

3. Denial-of-Service (DoS) Attacks

  1. Flooding DoS: Overwhelming systems with requests (e.g., SYN Flood, UDP Flood, ICMP Flood).
  2. Application Layer DoS: Exploiting application resources (HTTP Flood, DNS Amplification).
  3. Distributed DoS (DDoS): Large-scale attack using botnets.

4. Penetration Attacks

  1. Network Penetration: Exploiting misconfigurations in networks (Metasploit, Netcat).
  2. Web Application Penetration: Attacking websites via SQL Injection, XSS, CSRF (Burp Suite, OWASP ZAP).
  3. Social Engineering: Manipulating people to reveal confidential data (Phishing, Pretexting, Baiting).

5. Other Notable Attacks

  1. SQL Injection: Exploiting database vulnerabilities for unauthorized access.
  2. Man-in-the-Middle (MITM): Intercepting and altering communication between parties.
  3. Privilege Escalation: Gaining higher permissions on a system.

6. Prevention & Detection Strategies

7. Attack Detection Tools

8. Case Studies